{"id":306446,"date":"2009-09-24T10:00:59","date_gmt":"2009-09-24T17:00:59","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?p=306446"},"modified":"2016-10-17T11:20:30","modified_gmt":"2016-10-17T18:20:30","slug":"cryptography-receives-indian-scrutiny","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/research\/blog\/cryptography-receives-indian-scrutiny\/","title":{"rendered":"Cryptography Receives Indian Scrutiny"},"content":{"rendered":"<p><em>By Rob Knies, Managing Editor, Microsoft Research<\/em><\/p>\n<p>You employ cryptographic techniques on a daily basis \u2026 don\u2019t you?<\/p>\n<p>Sure you do. Every time you type a password into a computer, you are practicing cryptography, using secret information to verify your identity. The same principle is invoked when you make a bid on eBay, purchase a book online, or push an ATM card into a cash machine.<\/p>\n<p>A decade into the 21st century, cryptographic techniques have become an integral part of our day-to-day lives, and nobody knows that better than <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/satya\/\" target=\"_blank\">Satya Lokam<\/a> of <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/lab\/microsoft-research-india\/\" target=\"_blank\">Microsoft Research India<\/a>. He heads the <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/group\/cryptography-security-and-applied-mathematics\/\" target=\"_blank\">Cryptography, Security, and Applied Mathematics<\/a> (CSAM) group, founded in May 2006 by <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/venkie\/\" target=\"_blank\">Ramarathnam (Venkie) Venkatesan<\/a>, who remains an active member.<\/p>\n<div id=\"attachment_306449\" style=\"width: 200px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-306449\" class=\"size-full wp-image-306449\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/10\/Satya-Lokam.jpg\" alt=\"Satya Lokam\" width=\"190\" height=\"252\" \/><p id=\"caption-attachment-306449\" class=\"wp-caption-text\">Satya Lokam<\/p><\/div>\n<p>Lokam\u2019s group focuses on theoretical and practical aspects of cryptography and security, as well as on related areas of theoretical computer science and mathematics, such as complexity theory and number theory. Such fields hold tremendous potential for Microsoft.<\/p>\n<p>Underscoring the importance of such research, Lokam recently has hired a pair of young, yet already adept, researchers, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/neeraka\/\" target=\"_blank\">Neeraj Kayal<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/vipul\/\" target=\"_blank\">Vipul Goyal<\/a>.<\/p>\n<p>\u201cThe main goal of our work,\u201d Lokam says, \u201cis to establish ourselves as top-notch researchers in the areas we work in.<\/p>\n<p>\u201cWe leverage this strength of research to impact Microsoft technologies and to acquire intellectual capabilities for potential future directions the company might take, as well as to influence such future directions.\u201d<\/p>\n<p>Such results require expertise in some of the most fundamental areas of computer-science research.<\/p>\n<p>\u201cA substantial part of our research,\u201d Lokam says, \u201cis invested into foundational questions in theoretical computer science and mathematics that will have long-term impact on our understanding of computational complexity, cryptography, and security\u2014and their mutual connections.<\/p>\n<p>\u201cOur choice of problems in cryptography and security is driven by the challenges faced by the research community and the needs of emerging technologies. Our fundamental research pushes the frontiers of computational complexity and the mathematical foundations of modern cryptography.\u201d<\/p>\n<p>And, he notes, that while technology transfer is a priority, it can only occur if you have strong research. For that reason, from the outset, Lokam made finding top-notch researchers a priority.<\/p>\n<p>\u201cWe invested a great deal of effort,\u201d he says, \u201cinto hiring strong researchers in the areas of cryptography, security, and complexity theory to build a world-class group.\u201d<\/p>\n<p>Members, in addition to Lokam and Venkatesan, include Prasad Naldurg, Raghav Bhaskar, Srivatsan Laxman, Vijay Patankar, and, since September 2008, Kayal\u2014with Goyal to join them in a couple of months.<\/p>\n<p>\u201cWe are proud,\u201d Lokam says, \u201cof having young, brilliant researchers such as Neeraj and Vipul on our team.\u201d<\/p>\n<h2>A Big Splash<\/h2>\n<p>Kayal made a sudden name for himself when he, along with Manindra Agrawal and Nitin Saxena of the Department of Computer Science & Engineering at the Indian Institute of Technology Kanpur, electrified the mathematics community seven years ago with the paper <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.cse.iitk.ac.in\/users\/manindra\/algebra\/primality_v6.pdf\" target=\"_blank\"><em>Primes Is in P<\/em><span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. The paper offered a solution to a problem that had confounded mathematicians for decades: how quickly a computer can identify if a given number is prime.<\/p>\n<div id=\"attachment_306452\" style=\"width: 200px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-306452\" class=\"size-full wp-image-306452\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/10\/Neeraj-Kayal.jpg\" alt=\"Neeraj Kayal\" width=\"190\" height=\"252\" \/><p id=\"caption-attachment-306452\" class=\"wp-caption-text\">Neeraj Kayal<\/p><\/div>\n<p>The identification of prime numbers is critical to many cryptographic procedures because it is generally believed to be a computationally complex problem.<\/p>\n<p>Kayal, Agrawal, and Saxena devised a fast, definitive technique to determine this, a task previous algorithms could approach but could not perfect.<\/p>\n<p>Acclaim came swiftly when their paper circulated among leading mathematicians. A <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.nytimes.com\/2002\/08\/08\/science\/08MATH.html\" target=\"_blank\">story<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> in <em>The New York Times<\/em> shortly thereafter stated that their algorithm, called the AKS Primality Test, \u201csimply and elegantly solves a problem that has challenged many of the best minds in the field for decades.\u201d<\/p>\n<p>In 2006,<em> Primes Is in P<\/em> went on to win the G\u00f6del Prize, a prestigious award presented to the authors of outstanding papers in theoretical computer science. All the attention was an unexpected delight for Kayal and his co-authors<\/p>\n<p>\u201cWe three were all surprised by the amount of attention that work attracted, especially among non-scientists,\u201d he recalls. \u201cIt was very satisfying to have our work recognized and awarded. On the other hand, the attention has also led to increased expectations and sometimes a gnawing fear that the work on primality testing might be a flash in the pan. I counter that by trying to maintain a playful and exploratory attitude while allowing myself to make lots of mistakes in the process.\u201d<\/p>\n<p>At Microsoft Research India, he finds that he has that ability.<\/p>\n<p>\u201cLike any university,\u201d Kayal says, \u201cI really have the freedom to work on topics that excite me. I can always find great colleagues willing to listen to half-baked ideas and to talk about research in general.\u201d<\/p>\n<p>Much of his current research revolves around the significant speed improvements that algorithms sometimes obtain by exploiting the power of subtraction, or cancellation. At intermediate stages of their operation, such algorithms generate many more\u00a0terms (monomials) than are present in the target function. As the computation reaches its climax, these extraneous terms are canceled out, leaving precisely those terms that are present in the target function.<\/p>\n<p>\u201cFor many computational problems, we know of algorithms that perform significantly better than those we\u2019re taught in elementary school,\u201d Kayal says, \u201cand typically, these faster algorithms exploit the power of subtraction or cancellation in some beautiful and nontrivial way.\u201d<\/p>\n<p>He cites three fundamental questions as the focus of today\u2019s research into computer science, including his own:<\/p>\n<ul>\n<li>Can randomness enhance computation?<\/li>\n<li>Can parallelism enhance computation?<\/li>\n<li>Can non-determinism\u2014the ability to guess and check\u2014enhance computation?<\/li>\n<\/ul>\n<p>\u201cPerhaps,\u201d Kayal says, \u201cprogress on some of these questions, as well as the development of fast new algorithms, will depend on our ability to better understand and exploit the power of cancellations.\u201d<\/p>\n<p>That focus on algebraic complexity complements CSAM\u2019s efforts.<\/p>\n<p>\u201cNeeraj is an outstanding researcher in complexity theory,\u201d Lokam notes, \u201cwith stellar results and numerous awards to his credit. A deep understanding of the complexity of various algebraic problems will have an impact on many areas of computer science and mathematics, including cryptography.\u201d<\/p>\n<h2>Love for the Labs<\/h2>\n<p>For Goyal, already well known in the cryptographic community for his solutions to challenging problems and his work in developing practical cryptographic schemes, working for Microsoft Research has become a passion in itself.<\/p>\n<div id=\"attachment_306455\" style=\"width: 200px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-306455\" class=\"size-full wp-image-306455\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/10\/Vipul-Goyal.jpg\" alt=\"Vipul Goyal\" width=\"190\" height=\"252\" \/><p id=\"caption-attachment-306455\" class=\"wp-caption-text\">Vipul Goyal<\/p><\/div>\n<p>\u201cI was interning at <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/lab\/microsoft-research-redmond\/\" target=\"_blank\">Microsoft Research Redmond<\/a> in the summer of 2007 when my mentor, Venkie, told me about [Microsoft Research India]. I had a great experience working as an intern in Microsoft Research Redmond\u2014I went back in summer 2008!\u2014so I decided to visit Microsoft Research India in December 2007 and instantly fell in love with it: so many great researchers, exciting visitors\u2014and free lunch! If felt like a family, and I could see myself being a happy part of it. I decided to apply for a position, and fortunately, I was offered one.\u201d<\/p>\n<p>Goyal, whose interests focus on cryptography and information security, is in the process of completing work on his UCLA thesis. This summer, he enjoyed his latest internship, in a novel yet familiar setting.<\/p>\n<p>\u201cI am working on designing powerful and general cryptographic protocols for the Internet,\u201d he says. \u201cI interned this summer at Microsoft Research Silicon Valley, and I have visited four of the six global Microsoft Research labs. My plan is to work on my thesis, defend, and then join the [India] lab.\u201d<\/p>\n<p>Why such affection for Microsoft Research?<\/p>\n<p>\u201cA major benefit of being at Microsoft Research,\u201d Goyal says, \u201cis that you get the best of both worlds: the kind of freedom to explore your ideas that you get in an academic setting, as well as the resources of a company as big as Microsoft to turn these ideas into reality.<\/p>\n<p>\u201cI expect to work on problems ranging from very fundamental\u2014those that shed light on the kind of cryptographic protocols that can exist for the Internet\u2014to the ones that can have real-world impact right away, like more effective solutions to prevent phishing attacks.\u201d<\/p>\n<p>\u201cVipul already has a reputation of being a prolific researcher,\u201d Lokam says, \u201cand is unique in the broad spectrum of topics he works on, ranging from abstract theoretical to very practical. Together with one of his advisors, Amit Sahai at UCLA, he recently resolved a fundamental conjecture\u2014called the Simultaneous Resettability in Zero-Knowledge Proofs\u2014that baffled several eminent researchers. This is an intricate proof involving several novel techniques that will likely find other applications.\u201d<\/p>\n<h2>Practical Impact<\/h2>\n<p>Goyal also has researched attribute-based encryption, which happens to be one of CSAM\u2019s research focuses, along with symmetric searchable encryption and order-preserving encryption. All fall under the umbrella of cryptography for the cloud and are part of work driven by Roy DSouza, a partner architect for Microsoft\u2019s Cloud DB team, and Rahul Auradkar, director of the Storage Solutions group. Those teams, based in Redmond, are collaborating with CSAM to build a cryptographic infrastructure for cloud computing.<\/p>\n<p>\u201cThis is somewhat of an unusual project,\u201d Lokam explains, \u201cin that much of the architectural design and scenario analysis work has been done by Roy and Rahul and their teams. We together identify research problems in cryptography that arise in this framework and either work on new solutions or identify and modify existing ones.\u201d<\/p>\n<p>That work, which is ongoing, also features contributions from other Microsoft Research labs and from academic institutes.<\/p>\n<p>\u201cOur work was inspired by a project on searchable encryption in collaboration with the Data Protection Manager team at the <a href=\"http:\/\/www.microsoft.com\/india\/msidc\/\" target=\"_blank\">India Development Center<\/a>, based in Hyderabad,\u201d Lokam explains. \u201cA few months into this project, Roy visited us and helped us define a much broader scope for the cryptographic problems we have been working on.\u201d<\/p>\n<p>That broader context includes secure database services, Exchange hosted services, and cloud computing.<\/p>\n<p>\u201cWhen we started to explore cryptographic techniques for the cloud,\u201d DSouza says, \u201cwe learned about the IDC work that Satya describes. But we discovered that this was not practical for complex business scenarios, and most of the research in this area is challenging to implement at scale in the cloud.<\/p>\n<p>\u201cHowever, our interaction with the Microsoft Research India team has taken a fruitful direction, because our product teams zero in on the precise cloud problem, and then our embedded cryptographers collaborate with Satya\u2019s team to leverage its strength and critical mass, channeled in a manner that focuses on practical implementations and time to market.\u201d<\/p>\n<p>It\u2019s a prime example of productive, customer-focused interaction between researchers and product teams.<\/p>\n<p>\u201cEnterprises use data and storage services, whether offered as cloud services or as on-premise applications, in a variety of scenarios that span a swath of applications,\u201d Auradkar says. \u201cStaying focused on scenarios and applications that benefit from newer techniques and offer value to customers is an imperative. The primary focus for our interaction with the CSAM team is to understand what is possible and, subsequently, develop and deploy data and storage services.\u201d<\/p>\n<p>The collaboration was aided by Microsoft Research India\u2019s <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/group\/advanced-development-group\/\" target=\"_blank\">Advanced Development and Prototyping<\/a> (ADP) team.<\/p>\n<p>\u201cWe collaborate extensively with the ADP team,\u201d Lokam says. \u201cThey have been of tremendous help in interfacing between our research and various product teams.\u201d<\/p>\n<h2>Efficient Vulnerability Handling<\/h2>\n<p>The team also has worked with the Redmond-based Microsoft Security Engineering Center Security Science group on a project called Pattern Mining for Security, designed to help strengthen software security. The project uses research on data mining to analyze and prioritize attack scenarios, and it has enabled the Redmond team to classify and handle security vulnerabilities much more efficiently.<\/p>\n<div id=\"attachment_306458\" style=\"width: 200px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-306458\" class=\"size-full wp-image-306458\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/10\/Prasad-Naldurg.jpg\" alt=\"Prasad Naldurg\" width=\"190\" height=\"252\" \/><p id=\"caption-attachment-306458\" class=\"wp-caption-text\">Prasad Naldurg<\/p><\/div>\n<p>\u201cSecurity audit teams in Microsoft routinely collect auditing information and store them in large databases,\u201d says Naldurg, who was joined in the effort by colleagues Laxman and Venkatesan. \u201cOnly a fraction of these reports are interesting to security analysts, in the sense that they correspond to new vulnerabilities, say in configuration files or in dynamically executed scripts that can be exploited by malware. Evidence of attempted malicious behavior, including failed attack attempts, is available in these databases but require super-human effort to find.<\/p>\n<p>\u201cWith our pattern-based classification algorithm, we are able to automate the task of classifying these reports as malicious or benign and bring to attention only reports that are of high value to the analyst. We have a novel scoring technique for prioritization that works by finding patterns of interesting features that occur together in both malicious and benign and assigning weights to these features. Only a small number of hand-labeled samples are required to bootstrap our algorithm.\u201d<\/p>\n<p>The CSAM techniques, Naldurg adds, have been applied successfully to detect and prioritize access-control configuration vulnerabilities in Windows XP, and the researchers are extending their work to detect malicious JavaScript files without requiring expensive static analysis.<\/p>\n<h2>Approaching Success<\/h2>\n<p>CSAM researchers have a track record of publishing papers in top conferences and journals and have established close interactions with the Indian academic community. Group members collaborate with Ph.D. students and faculty, teach at institutes, serve on editorial boards and program committees, deliver talks, and review papers and grant proposals. Lokam just completed writing a book, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/dx.doi.org\/10.1561\/0400000011\" target=\"_blank\"><em>Complexity Lower Bounds Using Linear Algebra<\/em><span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, part of a series called <em>Foundations and Trends in Theoretical Computer Science<\/em>, edited by Madhu Sudan, a principal researcher at <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/lab\/microsoft-research-new-england\/\" target=\"_blank\">Microsoft Research New England<\/a>.<\/p>\n<p>All this activity confirms for Lokam that he made the right decision back in May 2006 to join Microsoft Research India.<\/p>\n<p>\u201cMy family and I had been thinking of returning to India for several years, but we kept struggling with various options and constraints to implement that wish,\u201d he says. \u201cWhile visiting Microsoft Research Redmond, I learned about Microsoft Research India and that Venkie was helping to start a Crypto group here. After talking to Venkie, <a href=\"https:\/\/www.microsoft.com\/en-in\/about\/about-microsoft\/profile-p-anandan.aspx\" target=\"_blank\">P. Anandan<\/a> [managing director of the India lab], and other researchers here, I felt that this would be a great place to pursue my research in theoretical computer science and cryptography and would provide a perfect opportunity to move my family to India.\u201d<\/p>\n<p>So, is he ready to declare his team\u2019s mission a success? Not quite, but clearly progress is being made in that direction.<\/p>\n<p>\u201cWe will consider our mission a success,\u201d Lokam concludes, \u201cwhen we are recognized as the best in the world in the research domains we work in, both as individual researchers and collectively as a group\u2014and when our work finds its way into Microsoft technologies.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Rob Knies, Managing Editor, Microsoft Research You employ cryptographic techniques on a daily basis \u2026 don\u2019t you? Sure you do. Every time you type a password into a computer, you are practicing cryptography, using secret information to verify your identity. The same principle is invoked when you make a bid on eBay, purchase a [&hellip;]<\/p>\n","protected":false},"author":39507,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[],"msr_hide_image_in_river":0,"footnotes":""},"categories":[194483,194489],"tags":[214811,187122,202739,203099,186803,186414],"research-area":[13546,13558],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-306446","post","type-post","status-publish","format-standard","hentry","category-mathematics","category-security","tag-complexity-theory","tag-cryptography","tag-microsoft-india-development-center","tag-number-theory","tag-passwords","tag-security","msr-research-area-computational-sciences-mathematics","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[199562,199563,199565],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[144675],"related-projects":[],"related-events":[],"related-researchers":[],"msr_type":"Post","byline":"","formattedDate":"September 24, 2009","formattedExcerpt":"By Rob Knies, Managing Editor, Microsoft Research You employ cryptographic techniques on a daily basis \u2026 don\u2019t you? Sure you do. Every time you type a password into a computer, you are practicing cryptography, using secret information to verify your identity. The same principle is&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/306446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/users\/39507"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/comments?post=306446"}],"version-history":[{"count":5,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/306446\/revisions"}],"predecessor-version":[{"id":306773,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/306446\/revisions\/306773"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=306446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/categories?post=306446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/tags?post=306446"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=306446"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=306446"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=306446"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=306446"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=306446"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=306446"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=306446"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=306446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}